7.6 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:H/Au:N/C:C/I:C/A:C
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.3 High
AI Score
Confidence
High
0.955 High
EPSS
Percentile
99.4%
Multiple vulnerabilities were found in Microsoft Browsers. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, bypass security restrictions.
Below is a complete list of vulnerabilities:
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2018-0943 critical
CVE-2018-0945 critical
CVE-2018-0946 critical
CVE-2018-0951 critical
CVE-2018-0953 critical
CVE-2018-0954 critical
CVE-2018-1021 warning
CVE-2018-8123 warning
CVE-2018-1022 critical
CVE-2018-8130 critical
CVE-2018-8178 critical
CVE-2018-8128 critical
CVE-2018-8133 critical
CVE-2018-8114 critical
CVE-2018-0955 critical
CVE-2018-8139 critical
CVE-2018-1025 warning
CVE-2018-8112 warning
CVE-2018-8145 critical
CVE-2018-8126 high
CVE-2018-8137 critical
CVE-2018-8122 critical
CVE-2018-8179 critical
CVE-2018-8177 critical
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
support.microsoft.com/kb/4103716
support.microsoft.com/kb/4103718
support.microsoft.com/kb/4103721
support.microsoft.com/kb/4103723
support.microsoft.com/kb/4103725
support.microsoft.com/kb/4103727
support.microsoft.com/kb/4103730
support.microsoft.com/kb/4103731
support.microsoft.com/kb/4103768
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0943
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0945
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0946
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0951
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0953
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0954
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-0955
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-1021
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-1022
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-1025
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8112
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8114
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8122
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8123
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8126
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8128
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8130
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8133
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8137
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8139
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8145
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8177
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8178
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2018-8179
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/ChakraCore/
threats.kaspersky.com/en/product/Microsoft-Edge/
threats.kaspersky.com/en/product/Microsoft-Internet-Explorer/
7.6 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:H/Au:N/C:C/I:C/A:C
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.3 High
AI Score
Confidence
High
0.955 High
EPSS
Percentile
99.4%